Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 05:50
Static task
static1
Behavioral task
behavioral1
Sample
1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe
Resource
win10v2004-20221111-en
General
-
Target
1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe
-
Size
1.4MB
-
MD5
9b4a4753f9cc404f7800dcaaf1c517cd
-
SHA1
a6a45f553e6fb30d5687065f779a1f554c9726d4
-
SHA256
1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58
-
SHA512
0ed284e66c9750611f1b9a348ae9fe4265afd0bff1b4764cd5a1a0ed034117f53d6ea82f954ec7ef2ac21e92a1519c1cb7a040d1a55abe6f30312fa7952c533a
-
SSDEEP
24576:hrK6dClXmekxlm1dl4r260n4dz0as5jc3AZ1COwiUP/5lq8Ai:hrBew72604doSw6ewd
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exedescription pid process target process PID 1488 set thread context of 1748 1488 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe -
Processes:
1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exepid process 1748 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe 1748 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe 1748 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe 1748 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe 1748 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exedescription pid process target process PID 1488 wrote to memory of 1748 1488 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe PID 1488 wrote to memory of 1748 1488 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe PID 1488 wrote to memory of 1748 1488 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe PID 1488 wrote to memory of 1748 1488 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe PID 1488 wrote to memory of 1748 1488 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe PID 1488 wrote to memory of 1748 1488 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe PID 1488 wrote to memory of 1748 1488 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe PID 1488 wrote to memory of 1748 1488 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe PID 1488 wrote to memory of 1748 1488 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe PID 1488 wrote to memory of 1748 1488 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe PID 1488 wrote to memory of 1748 1488 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe 1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe"C:\Users\Admin\AppData\Local\Temp\1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\1707856b8780e2b15319ec0f0a2ad9446ea446a7f09481d58ef76b794f9d6c58.exe
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1748
-